首页 > 最新文献

2021 5th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)最新文献

英文 中文
Evaluation of an electrical infrastructure of an existing building and economic and environmental benefits of its modernization 评估现有建筑物的电力基础设施及其现代化的经济和环境效益
V. Chobanov, Mihaela Asenova
In this case study will be summarised the benefits of upgrading existing building services systems, and more specifically the existing electrical systems. The advantages will be reviewed in following aspects: Economical; Energy consumption; Human Comfort; Reducing Carbon Footprint. For the purposes of this report, an existing building will be reviewed where refurbishment has been undergone in its design stage for the building services systems. The aim of the report will be to evaluate the systems changes and their impact to the building overall performance, and also provide suggestions for further improvements to be implemented.
在这个案例中,我们将总结升级现有楼宇设备系统的好处,更具体地说,是升级现有的电力系统。主要从以下几个方面进行综述:经济实惠;能源消耗;舒适性;减少碳足迹。为撰写本报告,我们将检讨一幢已在设计阶段进行楼宇设备系统翻新的现有楼宇。报告的目的是评估系统的改变及其对建筑物整体表现的影响,并提供进一步改善的建议。
{"title":"Evaluation of an electrical infrastructure of an existing building and economic and environmental benefits of its modernization","authors":"V. Chobanov, Mihaela Asenova","doi":"10.1109/ISMSIT52890.2021.9604720","DOIUrl":"https://doi.org/10.1109/ISMSIT52890.2021.9604720","url":null,"abstract":"In this case study will be summarised the benefits of upgrading existing building services systems, and more specifically the existing electrical systems. The advantages will be reviewed in following aspects: Economical; Energy consumption; Human Comfort; Reducing Carbon Footprint. For the purposes of this report, an existing building will be reviewed where refurbishment has been undergone in its design stage for the building services systems. The aim of the report will be to evaluate the systems changes and their impact to the building overall performance, and also provide suggestions for further improvements to be implemented.","PeriodicalId":120997,"journal":{"name":"2021 5th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123259700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Feature-Weighted Rule for the K-Nearest Neighbor 一种k近邻的特征加权规则
Tsvetelina Mladenova
The K-nearest Neighbor algorithm is a well-known non-parametric algorithm used for classifying. The algorithm is a simple, intuitive and preferable choice for many machine-learning models. Having that in mind, the negatives of the method should not be overlooked – the sensitivity of the k value, the choosing method of the neighbors and the voting mechanism.This paper reviews some state-of-art weight algorithms and motivated by their ideas proposes a solution for weight function. Unlike most weight functions, the proposed solution uses the features of the neighbors instead of just their distances. Some experiments are conducted on both real-world datasets and on well-known experimental ones. Some future improvements are targeted and the advantages and disadvantages are discussed.
k近邻算法是一种著名的用于分类的非参数算法。该算法是许多机器学习模型的简单、直观和优选的选择。考虑到这一点,该方法的缺点也不应被忽视——k值的敏感性、邻居的选择方法和投票机制。本文回顾了目前的一些权重算法,并在其思想的启发下,提出了一种求解权函数的方法。与大多数权重函数不同,提出的解决方案使用邻居的特征,而不仅仅是它们的距离。一些实验是在真实数据集和已知的实验数据集上进行的。有针对性地提出了今后的改进措施,并对其优缺点进行了讨论。
{"title":"A Feature-Weighted Rule for the K-Nearest Neighbor","authors":"Tsvetelina Mladenova","doi":"10.1109/ISMSIT52890.2021.9604563","DOIUrl":"https://doi.org/10.1109/ISMSIT52890.2021.9604563","url":null,"abstract":"The K-nearest Neighbor algorithm is a well-known non-parametric algorithm used for classifying. The algorithm is a simple, intuitive and preferable choice for many machine-learning models. Having that in mind, the negatives of the method should not be overlooked – the sensitivity of the k value, the choosing method of the neighbors and the voting mechanism.This paper reviews some state-of-art weight algorithms and motivated by their ideas proposes a solution for weight function. Unlike most weight functions, the proposed solution uses the features of the neighbors instead of just their distances. Some experiments are conducted on both real-world datasets and on well-known experimental ones. Some future improvements are targeted and the advantages and disadvantages are discussed.","PeriodicalId":120997,"journal":{"name":"2021 5th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114250087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Student Performance Evaluation of Distributed Algorithms Assignment in an Undergraduate Algorithms Course 大学生算法课程中分布式算法作业之学生表现评估
Anurag Dasgupta
Distributed algorithms are now present in many computing activities. The price decline of computer hardware, increase in speed of communication, the versatility of the Internet, and the advancement of network technology all have contributed immensely to the incredible growth and importance of distributed computing. Therefore, even an undergraduate is now expected to know at least the basics of distributed algorithms. This paper describes the experience and performance of students who are introduced to distributed algorithms in an undergraduate Algorithms course. The paper shows that for teaching new concepts, providing in-class examples should be emphasized more for effective student learning. It is more important compared to prior knowledge of similar concepts.
分布式算法现在出现在许多计算活动中。计算机硬件价格的下降、通信速度的提高、互联网的多功能性以及网络技术的进步都极大地促进了分布式计算的惊人增长和重要性。因此,即使是大学生现在也被要求至少了解分布式算法的基础知识。本文描述了在一门算法课程中,学生们对分布式算法的体验和表现。本文认为,在新概念的教学中,应更加注重课堂实例的提供,以促进学生的有效学习。与已有的类似概念的知识相比,它更为重要。
{"title":"Student Performance Evaluation of Distributed Algorithms Assignment in an Undergraduate Algorithms Course","authors":"Anurag Dasgupta","doi":"10.1109/ISMSIT52890.2021.9604749","DOIUrl":"https://doi.org/10.1109/ISMSIT52890.2021.9604749","url":null,"abstract":"Distributed algorithms are now present in many computing activities. The price decline of computer hardware, increase in speed of communication, the versatility of the Internet, and the advancement of network technology all have contributed immensely to the incredible growth and importance of distributed computing. Therefore, even an undergraduate is now expected to know at least the basics of distributed algorithms. This paper describes the experience and performance of students who are introduced to distributed algorithms in an undergraduate Algorithms course. The paper shows that for teaching new concepts, providing in-class examples should be emphasized more for effective student learning. It is more important compared to prior knowledge of similar concepts.","PeriodicalId":120997,"journal":{"name":"2021 5th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"7 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114548872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Thresholding with Iterative Fuzzy Logic Based Image Enhancements for Wiper Arm Defect Detection 基于迭代模糊逻辑的自适应阈值图像增强在雨刷臂缺陷检测中的应用
Chi Wei Foo, Lee Choo Tay, W. Lai
Quality control is an essential component in manufacturing process that ensures defective products are not shipped to customers. For a product like wiper arms, sophisticated methods for defect detection are required due to challenges of complex structures and reflective surfaces. This paper aimed to show enhancement to the previous solution by improving the image enhancement and thresholding steps, as well as the defect detection algorithm applied. In this proposed approach, the image is segmented using an improved Otsu-based threshold value selection to acquire the region of interest (ROI). The image enhancement step utilizes a modified iterative Fuzzy Clipped Contrast-Limited Adaptive Histogram Equalization (FC-CLAHE) that evaluates the clip limit required via contrast and entropy of images. This enhanced image is then binarized via adaptive thresholding with probabilistic Hough transform (PHT) and convex hull algorithm to preserve the car wiper arm features. The defect is then detected using a multistage blob detection algorithm that involves blob contour analysis based on contour area and contour mean values. Test results showed significant reduction in false negatives from 52% to 12.4%.
质量控制是生产过程中必不可少的组成部分,以确保不将有缺陷的产品运送给客户。对于像雨刷臂这样的产品,由于复杂的结构和反射表面的挑战,需要复杂的缺陷检测方法。本文旨在通过改进图像增强和阈值分割步骤,以及缺陷检测算法,对之前的解决方案进行增强。在该方法中,使用改进的基于otsu的阈值选择来分割图像以获得感兴趣区域(ROI)。图像增强步骤利用改进的迭代模糊剪切对比度限制自适应直方图均衡化(FC-CLAHE),通过图像的对比度和熵来评估所需的剪辑限制。然后利用概率霍夫变换(PHT)和凸包算法的自适应阈值对增强后的图像进行二值化,以保留汽车雨刷臂的特征。然后使用多阶段斑点检测算法检测缺陷,该算法涉及基于轮廓面积和轮廓平均值的斑点轮廓分析。测试结果显示,假阴性率从52%显著降低到12.4%。
{"title":"Adaptive Thresholding with Iterative Fuzzy Logic Based Image Enhancements for Wiper Arm Defect Detection","authors":"Chi Wei Foo, Lee Choo Tay, W. Lai","doi":"10.1109/ISMSIT52890.2021.9604740","DOIUrl":"https://doi.org/10.1109/ISMSIT52890.2021.9604740","url":null,"abstract":"Quality control is an essential component in manufacturing process that ensures defective products are not shipped to customers. For a product like wiper arms, sophisticated methods for defect detection are required due to challenges of complex structures and reflective surfaces. This paper aimed to show enhancement to the previous solution by improving the image enhancement and thresholding steps, as well as the defect detection algorithm applied. In this proposed approach, the image is segmented using an improved Otsu-based threshold value selection to acquire the region of interest (ROI). The image enhancement step utilizes a modified iterative Fuzzy Clipped Contrast-Limited Adaptive Histogram Equalization (FC-CLAHE) that evaluates the clip limit required via contrast and entropy of images. This enhanced image is then binarized via adaptive thresholding with probabilistic Hough transform (PHT) and convex hull algorithm to preserve the car wiper arm features. The defect is then detected using a multistage blob detection algorithm that involves blob contour analysis based on contour area and contour mean values. Test results showed significant reduction in false negatives from 52% to 12.4%.","PeriodicalId":120997,"journal":{"name":"2021 5th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116604221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Promising Cryptocurrency Analysis using Deep Learning 使用深度学习的有前途的加密货币分析
Selim Buyrukoğlu
Cryptocurrency is in great demand today and there is pretty much investment in cryptocurrencies by the investors. There are more than 6000 cryptocurrencies all over the world, which clearly shows that cryptocurrency is a growing investment market. For this reason, investors having ordinary income invest in promising cryptocurrencies with a low market value. However, these investors are often unconsciously investing and making losses. At this point, sensible investments can be made using data analysis methods based on deep learning. Therefore, this study aims to analyze promising cryptocurrencies with deep learning methods. Five promising cryptocurrencies were analyzed with the ensembles of LSTM and single-based LSTM networks. This study revealed that ensembles of LSTM network do not always provide better accuracy performance than the single-based LSTM network in the analysis of promising cryptocurrencies. In other words, these two deep learning methods can be employed to obtain reliable analysis results in promising cryptocurrencies.
如今,加密货币需求量很大,投资者对加密货币进行了大量投资。全球有超过6000种加密货币,这清楚地表明加密货币是一个不断增长的投资市场。因此,拥有普通收入的投资者投资于市场价值较低的有前途的加密货币。然而,这些投资者往往在不知不觉中投资和亏损。此时,可以使用基于深度学习的数据分析方法进行明智的投资。因此,本研究旨在使用深度学习方法分析有前途的加密货币。利用LSTM网络和基于单一LSTM网络的组合分析了五种有前景的加密货币。本研究表明,在分析有前途的加密货币时,LSTM网络的集合并不总是比基于单一的LSTM网络提供更好的准确性性能。换句话说,这两种深度学习方法可以在有前途的加密货币中获得可靠的分析结果。
{"title":"Promising Cryptocurrency Analysis using Deep Learning","authors":"Selim Buyrukoğlu","doi":"10.1109/ISMSIT52890.2021.9604721","DOIUrl":"https://doi.org/10.1109/ISMSIT52890.2021.9604721","url":null,"abstract":"Cryptocurrency is in great demand today and there is pretty much investment in cryptocurrencies by the investors. There are more than 6000 cryptocurrencies all over the world, which clearly shows that cryptocurrency is a growing investment market. For this reason, investors having ordinary income invest in promising cryptocurrencies with a low market value. However, these investors are often unconsciously investing and making losses. At this point, sensible investments can be made using data analysis methods based on deep learning. Therefore, this study aims to analyze promising cryptocurrencies with deep learning methods. Five promising cryptocurrencies were analyzed with the ensembles of LSTM and single-based LSTM networks. This study revealed that ensembles of LSTM network do not always provide better accuracy performance than the single-based LSTM network in the analysis of promising cryptocurrencies. In other words, these two deep learning methods can be employed to obtain reliable analysis results in promising cryptocurrencies.","PeriodicalId":120997,"journal":{"name":"2021 5th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123491562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Hybrid Fuzzy Control of Semi-Active Suspension System Using Magnetorheological Damper 磁流变阻尼器半主动悬架系统的混合模糊控制
S. Coskun, Omer Ozgur
The semi-active suspension systems equipped with a magnetorheological (MR) damper are extensively used due to their improved performance in vibration reduction. Supplying proper voltage as an input, the MR fluid behavior will form a solid-state, controlling stiffness and damping in semi-active suspensions. Incorporating the benefits of active suspension and passive suspension, a semi-active suspension with an MR damper offers a mechanically simple, safe, and low power consumption solution. This study develops an extended fuzzy control strategy to improve ride control under road disturbances. To this aim, a quarter car model is adopted where the modified Bouc-Wen MR damper model is utilized to control damping force via a fuzzy control and a proportional-integral control. Several simulations are carried out with the designed controller under both bump and sinusoidal types of road disturbances. The merits of the proposed controller are compared with a classical fuzzy controller and uncontrolled case, wherein a significant improvement in reducing body displacement as well as suspension deflections is achieved.
配备磁流变阻尼器的半主动悬架系统由于其改善的减振性能而得到广泛应用。提供适当的电压作为输入,磁流变液的行为将形成固态,控制半主动悬架的刚度和阻尼。结合主动悬架和被动悬架的优点,带MR阻尼器的半主动悬架提供了机械简单、安全、低功耗的解决方案。本研究提出一种扩展模糊控制策略,以改善道路干扰下的平顺性控制。为此,采用四分之一汽车模型,利用改进的Bouc-Wen MR阻尼器模型,通过模糊控制和比例积分控制对阻尼力进行控制。用所设计的控制器在颠簸和正弦两种道路干扰下进行了仿真。将该控制器与经典模糊控制器和不受控制的情况进行了比较,在减小车身位移和悬架挠度方面取得了显著的进步。
{"title":"Hybrid Fuzzy Control of Semi-Active Suspension System Using Magnetorheological Damper","authors":"S. Coskun, Omer Ozgur","doi":"10.1109/ISMSIT52890.2021.9604578","DOIUrl":"https://doi.org/10.1109/ISMSIT52890.2021.9604578","url":null,"abstract":"The semi-active suspension systems equipped with a magnetorheological (MR) damper are extensively used due to their improved performance in vibration reduction. Supplying proper voltage as an input, the MR fluid behavior will form a solid-state, controlling stiffness and damping in semi-active suspensions. Incorporating the benefits of active suspension and passive suspension, a semi-active suspension with an MR damper offers a mechanically simple, safe, and low power consumption solution. This study develops an extended fuzzy control strategy to improve ride control under road disturbances. To this aim, a quarter car model is adopted where the modified Bouc-Wen MR damper model is utilized to control damping force via a fuzzy control and a proportional-integral control. Several simulations are carried out with the designed controller under both bump and sinusoidal types of road disturbances. The merits of the proposed controller are compared with a classical fuzzy controller and uncontrolled case, wherein a significant improvement in reducing body displacement as well as suspension deflections is achieved.","PeriodicalId":120997,"journal":{"name":"2021 5th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130221237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Stochastic Network-Interdiction Model For Cyber Security 网络安全的随机网络拦截模型
M. Ertem, V. Bier
We propose a general defender-attacker model for security of computer networks, using attack graphs to represent the possible attacker strategies and defender options. The defender’s objective is to maximize the security of the network under a limited budget. In computer security, the attacker could be operating from the safety of a foreign country, and the cost of changing attack strategies may be quite low. To capture the ability of the attacker to launch multiple attempts, we represent the attacker’s success on each arc of the attack graph probabilistically, and formulate the resulting problem as a two- stage stochastic NI problem. We solve the resulting problem using two-stage stochastic optimization with recourse, and explore the attacker and defender strategies.
我们提出了一个通用的计算机网络安全防御者-攻击者模型,使用攻击图来表示可能的攻击者策略和防御者选项。防御者的目标是在有限的预算下使网络的安全性最大化。在计算机安全领域,攻击者可以在安全的国外进行操作,并且改变攻击策略的成本可能相当低。为了捕获攻击者发起多次尝试的能力,我们在攻击图的每个弧线上以概率表示攻击者的成功,并将结果问题表述为两阶段随机NI问题。我们采用带追索权的两阶段随机优化方法解决了这一问题,并探讨了攻击者和防御者的策略。
{"title":"A Stochastic Network-Interdiction Model For Cyber Security","authors":"M. Ertem, V. Bier","doi":"10.1109/ISMSIT52890.2021.9604681","DOIUrl":"https://doi.org/10.1109/ISMSIT52890.2021.9604681","url":null,"abstract":"We propose a general defender-attacker model for security of computer networks, using attack graphs to represent the possible attacker strategies and defender options. The defender’s objective is to maximize the security of the network under a limited budget. In computer security, the attacker could be operating from the safety of a foreign country, and the cost of changing attack strategies may be quite low. To capture the ability of the attacker to launch multiple attempts, we represent the attacker’s success on each arc of the attack graph probabilistically, and formulate the resulting problem as a two- stage stochastic NI problem. We solve the resulting problem using two-stage stochastic optimization with recourse, and explore the attacker and defender strategies.","PeriodicalId":120997,"journal":{"name":"2021 5th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125589123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ISMSIT 2021 Cover Page ISMSIT 2021封面页
{"title":"ISMSIT 2021 Cover Page","authors":"","doi":"10.1109/ismsit52890.2021.9604624","DOIUrl":"https://doi.org/10.1109/ismsit52890.2021.9604624","url":null,"abstract":"","PeriodicalId":120997,"journal":{"name":"2021 5th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122978155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of 3D measuring sensor for callibrating robot coordinate systems 实现用于标定机器人坐标系的三维测量传感器
B. Kostov, V. Hristov
In the present work, an implementation of 3D measuring sensor for calibrating user coordinate systems of robot is presented. The implementation is done by specially developed algorithm for the purpose. The algorithm is fully functional as for robots and other manipulators. This algorithm is developed in simulation mode and implemented in real environment. The calibration method is working on 100%
本文介绍了一种用于标定机器人用户坐标系的三维测量传感器的实现方法。该算法通过专门开发的算法实现。该算法与机器人和其他操纵器一样功能完备。该算法在仿真模式下开发,并在实际环境中实现。校准方法工作在100%
{"title":"Implementation of 3D measuring sensor for callibrating robot coordinate systems","authors":"B. Kostov, V. Hristov","doi":"10.1109/ISMSIT52890.2021.9604638","DOIUrl":"https://doi.org/10.1109/ISMSIT52890.2021.9604638","url":null,"abstract":"In the present work, an implementation of 3D measuring sensor for calibrating user coordinate systems of robot is presented. The implementation is done by specially developed algorithm for the purpose. The algorithm is fully functional as for robots and other manipulators. This algorithm is developed in simulation mode and implemented in real environment. The calibration method is working on 100%","PeriodicalId":120997,"journal":{"name":"2021 5th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126861421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An Efficient Transfer Learning-based Model for Classification of Brain Tumor 基于迁移学习的高效脑肿瘤分类模型
A. Alnemer, Jawad Rasheed
Brain tumor is ranked 12th deadliest cancerous tumor among children and adults. An early detection and identification of its type can help radiologists and medical practitioners in defining an effective treatment. Therefore, this study aims to devise an efficient but accurate human braintumor classification tool that exploits magnetic resonance imaging (MRI) to segregate glioma, meningioma, pituitary, and no tumor. For this, the study exploits a dataset of 7023 MR images and performed various image pro-processing steps to get brain image by removing unwanted noisy areas and margins. Further, it incorporates data augmentation techniques to enhance limited dataset and avoid overfitting issue. Finally, a modified pre-trained deep learning-based ResNet152V2 model is trained. Two separate experiments are conducted by training proposed model with and without augmented data. It is observed that the proposed network trained on augmented data significantly outperformed the network trained on original data by successfully distinguishing four clinical states of brain tumor with an overall accuracy of 98.9%.
脑瘤是儿童和成人中第12位最致命的癌症肿瘤。早期发现和识别其类型可以帮助放射科医生和医疗从业者确定有效的治疗方法。因此,本研究旨在设计一种高效而准确的人类脑肿瘤分类工具,利用磁共振成像(MRI)分离胶质瘤、脑膜瘤、垂体瘤和无瘤。为此,本研究利用了7023张MR图像的数据集,并进行了各种图像预处理步骤,通过去除不必要的噪声区域和边缘来获得大脑图像。此外,它还结合了数据增强技术来增强有限的数据集,避免过拟合问题。最后,训练一个改进的预训练深度学习的ResNet152V2模型。通过训练有增广数据和没有增广数据的模型进行了两个单独的实验。我们观察到,在增强数据上训练的网络明显优于在原始数据上训练的网络,成功地区分了脑肿瘤的四种临床状态,总体准确率为98.9%。
{"title":"An Efficient Transfer Learning-based Model for Classification of Brain Tumor","authors":"A. Alnemer, Jawad Rasheed","doi":"10.1109/ISMSIT52890.2021.9604677","DOIUrl":"https://doi.org/10.1109/ISMSIT52890.2021.9604677","url":null,"abstract":"Brain tumor is ranked 12th deadliest cancerous tumor among children and adults. An early detection and identification of its type can help radiologists and medical practitioners in defining an effective treatment. Therefore, this study aims to devise an efficient but accurate human braintumor classification tool that exploits magnetic resonance imaging (MRI) to segregate glioma, meningioma, pituitary, and no tumor. For this, the study exploits a dataset of 7023 MR images and performed various image pro-processing steps to get brain image by removing unwanted noisy areas and margins. Further, it incorporates data augmentation techniques to enhance limited dataset and avoid overfitting issue. Finally, a modified pre-trained deep learning-based ResNet152V2 model is trained. Two separate experiments are conducted by training proposed model with and without augmented data. It is observed that the proposed network trained on augmented data significantly outperformed the network trained on original data by successfully distinguishing four clinical states of brain tumor with an overall accuracy of 98.9%.","PeriodicalId":120997,"journal":{"name":"2021 5th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127250993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2021 5th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1